<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to process event exact same for events from multiple event source type? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33851#M6091</link>
    <description>&lt;P&gt;The type of re-use you're talking about &lt;EM&gt;does&lt;/EM&gt; occur in the transforms.  While it's true that you have to reference each transform (i.e., "user-account-change") for each applicable sourcetype in props.conf, you're reusing the regular expression rule itself which appears in transforms.conf.  Specifically with regards to Windows Event Logs, you might consider checking the source of these events in your results.  It may be possible to use a single props.conf stanza (like &lt;CODE&gt;[source::(WMI:WinEventLog|WinEventLog)...]&lt;/CODE&gt; based on source--think input path).  An example of this is found in the &lt;A href="http://splunk-base.splunk.com/apps/28933/splunk-for-windows-technology-add-on"&gt;Splunk for Windows Technology Add-on&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Apr 2012 18:26:30 GMT</pubDate>
    <dc:creator>sowings</dc:creator>
    <dc:date>2012-04-24T18:26:30Z</dc:date>
    <item>
      <title>How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33847#M6087</link>
      <description>&lt;P&gt;Let us say you have following lines in your props.conf file:&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;/P&gt;

&lt;P&gt;REPORT-common = user-account-change&lt;/P&gt;

&lt;P&gt;REPORT-win-2k3 = group-type-change&lt;/P&gt;

&lt;P&gt;You have another event source type ABC which generates exact same events as WinEvnetLog:Security so you want to apply the same transforms to it.  You can do so by adding following lines to your props.conf file:&lt;/P&gt;

&lt;P&gt;[ABC]&lt;/P&gt;

&lt;P&gt;REPORT-common = user-account-change&lt;/P&gt;

&lt;P&gt;REPORT-win-2k3 = group-type-change&lt;/P&gt;

&lt;P&gt;This duplicates these REPORT-* entries.  Is it possible to support more than one source types in props.conf for the same transform items?  An example is:&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security],[ABC]&lt;/P&gt;

&lt;P&gt;REPORT-common = user-account-change&lt;/P&gt;

&lt;P&gt;REPORT-win-2k3 = group-type-change&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2012 22:36:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33847#M6087</guid>
      <dc:creator>tonopahtaos</dc:creator>
      <dc:date>2012-04-23T22:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33848#M6088</link>
      <description>&lt;P&gt;To the best of my knowledge that is not possible. Also, as far as I know, there are no other applications than the Windows OS that produce the same kind of events as WinEventLog:Security.&lt;/P&gt;

&lt;P&gt;Are you sure that you should have different sourcetypes for this data? If the format of the events are the same, then it generally IS the same sourcetype. That is pretty much the idea behind sourcetypes. Then you can have just one props.conf stanza.&lt;/P&gt;

&lt;P&gt;/kristian&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 08:17:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33848#M6088</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2012-04-24T08:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33849#M6089</link>
      <description>&lt;P&gt;The WMI:WinEventLog:Security has exact same events as WinEventLog:Security.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 16:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33849#M6089</guid>
      <dc:creator>tonopahtaos</dc:creator>
      <dc:date>2012-04-24T16:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33850#M6090</link>
      <description>&lt;P&gt;The WMI:WinEventLog:Security has exact same events as WinEventLog:Security.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 16:59:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33850#M6090</guid>
      <dc:creator>tonopahtaos</dc:creator>
      <dc:date>2012-04-24T16:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33851#M6091</link>
      <description>&lt;P&gt;The type of re-use you're talking about &lt;EM&gt;does&lt;/EM&gt; occur in the transforms.  While it's true that you have to reference each transform (i.e., "user-account-change") for each applicable sourcetype in props.conf, you're reusing the regular expression rule itself which appears in transforms.conf.  Specifically with regards to Windows Event Logs, you might consider checking the source of these events in your results.  It may be possible to use a single props.conf stanza (like &lt;CODE&gt;[source::(WMI:WinEventLog|WinEventLog)...]&lt;/CODE&gt; based on source--think input path).  An example of this is found in the &lt;A href="http://splunk-base.splunk.com/apps/28933/splunk-for-windows-technology-add-on"&gt;Splunk for Windows Technology Add-on&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 18:26:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33851#M6091</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-04-24T18:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33852#M6092</link>
      <description>&lt;P&gt;[source::(WMI:WinEventLog|WinEventLog)...] is working for me.  &lt;/P&gt;

&lt;P&gt;I tried using regex yesterday and were not lucky.  The ... is the key to work.  &lt;/P&gt;

&lt;P&gt;Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 18:55:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33852#M6092</guid>
      <dc:creator>tonopahtaos</dc:creator>
      <dc:date>2012-04-24T18:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to process event exact same for events from multiple event source type?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33853#M6093</link>
      <description>&lt;P&gt;No problem.  Note that it seems that the "..." is only available for matches beginning with [source: ], kind of like using ... in inputs.conf.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2012 19:00:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-process-event-exact-same-for-events-from-multiple-event/m-p/33853#M6093</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-04-24T19:00:30Z</dc:date>
    </item>
  </channel>
</rss>

